0% found this document useful (0 votes)
13 views7 pages

Exploratory Speech

The document discusses the transformative potential of quantum computing, highlighting its historical evolution, core principles, and groundbreaking applications across various industries. It emphasizes the current state of quantum computing, including significant investments from major companies and the implications for cryptography and cybersecurity. Additionally, the document addresses the technical challenges and ethical considerations that accompany the rise of this powerful technology.

Uploaded by

prestonnguyen244
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views7 pages

Exploratory Speech

The document discusses the transformative potential of quantum computing, highlighting its historical evolution, core principles, and groundbreaking applications across various industries. It emphasizes the current state of quantum computing, including significant investments from major companies and the implications for cryptography and cybersecurity. Additionally, the document addresses the technical challenges and ethical considerations that accompany the rise of this powerful technology.

Uploaded by

prestonnguyen244
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.

Introduction
a. Attention Getter:
i. Good morning everyone. Imagine a computer so
powerful that it could break modern encryption,
revolutionize medicine, and solve problems in
seconds that would take our best classical
machines thousands of years. This isn’t the stuff
of science fiction-it’s the promise of quantum
computing.
b. Background and Audience Relevance:
i. Quantum computing can be difficult to grasp,
especially since most of our exposure to it comes
from movies like Ant-Man and Interstellar.
ii. However, beyond the Hollywood dramatizations lies
a revolutionary field that is already beginning to
reshape industries.
c. Speaker Credibility:
i. As a computer science student with a strong
interest in technology, I have researched quantum
computing extensively and am excited to share its
potential with you.
d. Thesis:
i. Today, I’m here to explore how quantum computing,
a technology emerging from the strange laws of
quantum mechanics, could redefine the future of
technology as we know it.
e. Preview of Main Points:
i. First, I’ll provide a brief history of computing
and explain why its current limits are paving the
way for quantum breakthroughs.
ii. Next, I’ll dive into the core principles of
quantum computing and highlight its groundbreaking
applications.
iii. Finally, I’ll discuss the significant technical
challenges and ethical considerations that come
with this powerful technology.
f. Transition to First Main Point:
i. Quantum computers may look strange, resembling a
cross between a golden chandelier and a giant
squid more than anything we traditionally
associate with a computer but that's largely
because our current viewpoint is a little too
narrow so before we dive deeper into the quantum
realm, let's explore the evolution of computing
and the challenges of today's systems that have
paved the way for this groundbreaking leap
forward.

2. Body
a.Main Point 1: What is Quantum Computing?
i. Sub Point 1: History of Classical Computing:
1. The Antikythera Mechanism dates back to
ancient Greece and was used to predict the
movements of the sun, the moon, and the
earth.
2. Fast forward to the 19th century, Charles
Babbage’s Analytical Engine (1837) which
introduced key concepts such as memory and
programming.
3. Then, World War 2 comes along. The intense
demands of the conflict led to the
construction of early electronic computers
such as Colossus and ENIAC.
4. In many ways, quantum computers are just the
next phase in this evolution. But in other
ways, they represent something entirely
different.
5. Theoretical physicist John Preskill explains,
“A quantum computer is not just a more
powerful version of today’s computers, just
like a light bulb is not a more powerful
candle” (Preskill, 2018).
ii. Sub Point 2: How Quantum Computing Works
1. A classical computer operates using bits, or
binary digits.
2. Quantum computers, on the other hand, operate
using quantum bits, or qubits. Similar to
bits, a qubit can also be set to one of two
values, 0 and 1. However, the qubit can be in
any proportions of both states at once due to
a quantum principle called superposition.
3. Another property a qubit can have is
entanglement.Entanglement links qubits
together, so a change in one affects the
other, even if they are separated by vast
distances.
4. As Albert Einstein famously described it,
quantum entanglement is “spooky action at a
distance” (Einstein, Podolsky & Rosen, 1935).
5. You may be wondering how being in this
superposition and entanglement state is
useful in a computer. Well for that we need
the final component: interference.
6. When you have many qubits entangled together
all of their wavefunctions are added
together into an overall wave function
describing the state of the quantum
computer.
7. These principles, superposition,
entanglement, and interference are what give
quantum computers their exponential computing
power.
8.
iii. Transition (Summary, Signpost, Preview):
1. Now that we have explored how quantum
computing works and how it differs from
classical computing, let’s shift our focus to
its real-world applications
b. Main Point 2: Applications of Quantum Computing:
i. Sub Point 1: Current State of Quantum Computing:
1. Quantum computing is no longer just a
theoretical concept
2. Major companies like Google and IBM are
investing billions into the development of
quantum computers.
3. In 2019, Google announced “quantum supremacy”
when they claimed their quantum computer
solved the problem in 200 seconds that would
have taken modern computers thousands of
years.
4. As reported by Nature, Google’s Sycamore
processor achieved a breakthrough that “marks
a new era of computational capabilities”
(Arute et al., 2019).
ii. Sub Point 2: Potential Applications of Quantum Computing:
1. Quantum computing has potential to transform
multiple industries:
a. Cryptography and Cybersecurity:
i. Shor’s Algorithm, a factorization
algorithm that could have a drastic
impact on the field of data
security, breaking modern
encryption.
ii. According to MIT researcher Peter
Shor, “A sufficiently large quantum
computer could decrypt most of
today’s secure communications”
(Shor, 1994).
b. Quantum Simulations
i. Quantum computers can simulate
chemical reactions at an atomic
level, something classical
computers struggle with.
iii. Transition (Summary, Signpost, Preview):
1. While the potential of quantum computing is
extraordinary, there are significant
technical and ethical challenges that must be
addressed.
c. Main Point 3: Challenges and Ethical Considerations
i. Sub Point 1: Technical Limitations and
Scalability:\
1. Currently, quantum computers are expensive,
unstable, and require extreme cooling to
function
2. They are susceptible to interference, leading
high rates of error in calculations
3. Beyond technical challenges, the rise of
quantum computing also presents ethical and
security concerns that we must address.
ii. Sub Point 2: Ethical and Security Concerns:
1. If quantum computers break today’s
encryption, national security and financial
systems could be at risk
2. Experts, including researchers from the
National Institute of Standards and
Technology (NIST), are working on post-
quantum cryptography.
iii. Transition and Signal Closing:
1. As we stand on the brink of this quantum
revolution, we must navigate both immense
opportunities and significant challenges
responsibly.

3. Conclusion
a. Restate Thesis:
i. Quantum computing is poised to redefine the
boundaries of what we thought possible, unlocking
new frontiers in science, security, and industry.
b. Review Main Points:
i. We explored the evolution of computing and how
quantum technology represents a radical shift
ii. We examined how quantum computing works and its
potential to revolutionize industries.
iii. We discussed the challenges and ethical concerns
that come with this powerful technology.
c. Memorable Closer:
i. While quantum computers won’t be replacing the
computers we have at home, they could redefine the
boundaries of what we thought possible, allowing
us to solve some of humanity’s greatest
challenges. Whether it’s discovering life-saving
medicines, securing digital communication, or
unveiling the mysteries of the universe, the
quantum revolution has only just begun.
References
Buenano, H., Guachimbosa V, V. H., Ruiz, J., Salazar Mera, J., & Sanchez Guerrero, J.
(2019). A reliable security alternative: Quantum Cryptography. 2019 Sixth International
Conference on eDemocracy & eGovernment (ICEDEG), 357–361.
https://doi.org/10.1109/icedeg.2019.8734385

Bavdekar, R., Jayant Chopde, E., Agrawal, A., Bhatia, A., & Tiwari, K. (2023). Post quantum
cryptography: A review of techniques, challenges and standardizations. 2023 International
Conference on Information Networking (ICOIN), 146–151.
https://doi.org/10.1109/icoin56518.2023.10048976

Farahmand, F. (2023). Quantum Cognition: A cognitive architecture for human-AI and in-
memory computing. Computer, 56(4), 135–138. https://doi.org/10.1109/mc.2023.3242056

Kanamori, Y., & Yoo, S.-M. (2020). Quantum Computing: Principles and applications.
Journal of International Technology and Information Management, 29(2), 43–71.
https://doi.org/10.58729/1941-6679.1410

Stackpole, B. (2024, January 11). Quantum Computing: What leaders need to know now.
MIT Sloan. https://mitsloan.mit.edu/ideas-made-to-matter/quantum-computing-what-
leaders-need-to-know-now
Hanafi, B., Ali, M., & Singh, D. (2025). Quantum algorithms for Enhanced Educational
Technologies. Discover Education, 4(1). https://doi.org/10.1007/s44217-025-00400-1

You might also like